RT
Cyber Security Engineer at Rampant Technologies Oakton, VA
Rampant Technologies
Oakton · On-site Full-time Senior 1w ago
About the role
Cyber Security Engineer – Rampant Technologies (Oakton, VA)
Job Summary
A Rampant Technologies Cybersecurity Engineer (CSE) is a key resource that is a part of the Rampant team reporting to the Principal Engineer overseeing the CSE team to deliver innovative Cyber Security solutions that are in alignment with the company’s goals.
Essential Duties & Responsibilities
- SME on problem identification, diagnosis, and resolution of problems
- Develop best practices for processes and standards that will better the system
- Perform vulnerability assessments using standardized tools (Nessus, DISA STIGs) and configuration updates as required to comply with security requirements.
- Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones.
- Perform hardening of ops systems, COTS and open-source product
- Validate best practices in Penetration testing, Configuration analysis, and Security
- Prepare comprehensive security assessment testing documentation to validate applied security controls in support of Assessment and Authorization (A&A) testing. Generating/maintaining security accreditation artifacts associated with RMF process to include, but not limited to Security Requirements Traceability Matrix, Security Plans, Certification Test Plans, Continuous Monitoring Plans)2
- Perform timely updates in accreditation DB
- Provide technical guidance focused on information security architecture.
Key Skills, Education & Experience
- Minimum of eight (3) years’ relevant experience as a Cybersecurity Engineer in programs and contracts of similar scope, type, and complexity is required; ideally three (3+) years of direct experience in the same level/grade for like role.
- Techno functional knowledge of/experience in:
- Execution of the Assessment & Authorization (A&A process) in accordance with government requirements (e.g. ICD-503)
- Information systems security and continuous monitoring practices and how to assess their effectiveness per NIST SP 800-53 and NIST SP 800-53A.
- DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
- Integrity, availability, authentication, and non-repudiation concepts
- IT security principles and methods (e.g., firewalls, demilitarized zones, encryption)
- Network access, identity, and access management (e.g., public key infrastructure [PKI])
- Security system design tools, methods, and techniques
- Relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure.
- TCP/IP networking technologies, Linux account administration, Linux folder permissions, Patch Management best practices on Operating Systems and applications, known vulnerabilities associated with Windows and Linux platforms.
- Continuous monitoring processes as outlined in NIST SP 800-137 appropriate for systems, leveraging existing tools, efforts, and incorporating new automation techniques.
- Virtualization technologies (e.g. VMWare, Docker)
- OSI model and how specific devices and protocols interoperate, including knowledge of protocols, and services for common network traffic
- DoD/IC system security control requirements
- XACTA and SNOW
- Security testing and penetration tools that include Assured Compliance Assessment Solution (ACAS), Wireshark, Retina, Tripwire, etc…
- Hands on experience and proficiency with the full Microsoft Office Suite and tools such as Microsoft Project, Microsoft Visio
- Self-starter/motivator and
Certifications and Clearance
- Must have certifications (certifications with * indicate willing to hire if certification is within 3-6 months of finalizing):
- Active TS/SCI w/ Poly clearance required
- Current certification compliant with DoD 8570 IAM or IAT level 3 OR obtain certification within 6 months of hire and maintain certification throughout employment.
- MUST meet DoD 8570 IAT Level III requirements
- IAT Level II Certifications (Security+ or equivalent)
Requirements
- Execution of the Assessment & Authorization (A&A process) in accordance with government requirements (e.g. ICD-503)
- Information systems security and continuous monitoring practices and how to assess their effectiveness per NIST SP 800-53 and NIST SP 800-53A
- DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
- Integrity, availability, authentication, and non-repudiation concepts
- IT security principles and methods (e.g., firewalls, demilitarized zones, encryption)
- Network access, identity, and access management (e.g., public key infrastructure [PKI])
- Security system design tools, methods, and techniques
- Relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure
- TCP/IP networking technologies, Linux account administration, Linux folder permissions, Patch Management best practices on Operating Systems and applications, known vulnerabilities associated with Windows and Linux platforms
- Continuous monitoring processes as outlined in NIST SP 800-137 appropriate for systems, leveraging existing tools, efforts, and incorporating new automation techniques
- DoD/IC system security control requirements
- Hands on experience and proficiency with the full Microsoft Office Suite and tools such as Microsoft Project, Microsoft Visio
Responsibilities
- SME on problem identification, diagnosis, and resolution of problems
- Develop best practices for processes and standards that will better the system
- Perform vulnerability assessments using standardized tools (Nessus, DISA STIGs) and configuration updates as required to comply with security requirements
- Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones
- Perform hardening of ops systems, COTS and open-source product
- Validate best practices in Penetration testing, Configuration analysis, and Security
- Prepare comprehensive security assessment testing documentation to validate applied security controls in support of Assessment and Authorization (A&A) testing
- Generate/maintain security accreditation artifacts associated with RMF process to include, but not limited to Security Requirements Traceability Matrix, Security Plans, Certification Test Plans, Continuous Monitoring Plans
- Perform timely updates in accreditation DB
- Provide technical guidance focused on information security architecture
Skills
ACASCNSSI 1253DISA STIGsDockerICD 503LinuxMicrosoft OfficeMicrosoft ProjectMicrosoft VisioNessusNIST SP 800-137NIST SP 800-37NIST SP 800-53NIST SP 800-53AOSI modelPKIRMFSecurity+SNOWTCP/IPTripwireVMWareWiresharkWindowsXACTA
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free